Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16092 open access dissertations and theses found for:
if(Prevented attacks)  »   Refine Search
32.
A new distributed framework for cyber attack detection and classification
by Gutta, Sandeep, M.S.  Oklahoma State University. 2011: 86 pages; 1506488.
34.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
36.
37.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
39.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
41.
Gaza: A case study of urban destruction through military involvement
by Ahmad, Nadiah N., M.A.  Temple University. 2011: 121 pages; 1494435.
42.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
43.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
44.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
45.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
46.
Reimagined: How the U.S. Defense Department Responds to Triggers and Organizes to Balance against Threats
by Roman, Javier Alexsandro, M.A.  The University of Texas at San Antonio. 2019: 100 pages; 13881251.
47.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
48.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
49.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
50.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
51.
Homeland security and terrorism in selected European states
by Deutcher, Eric M., M.A.  University of Denver. 2009: 182 pages; 1462094.
52.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
54.
Strategies of neuroprotection in an in vivo model of retinal degeneration induced by mitochondrial dysfunction
by Rojas-Martinez, Julio Cesar, Ph.D.  The University of Texas at Austin. 2009: 201 pages; 3369217.
57.
Making meaning of existential perspectives: Pentagon survivors share stories of September 11, 2001
by Shields, Jeraline C., Ph.D.  Fielding Graduate University. 2013: 115 pages; 3609804.
58.
The Implications of the Internet's Topological Structure for Its Efficiency, Security, and Reliability
by Nur, Abdullah Yasin, Ph.D.  University of Louisiana at Lafayette. 2018: 170 pages; 10980025.
59.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
60.
Security and privacy in location-based mobile ad-hoc networks
by El Defrawy, Karim, Ph.D.  University of California, Irvine. 2010: 174 pages; 3422236.
31 - 60 of 16092 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest